Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks

  • Authors:
  • Guttorm Sindre;Peter Karpati;Raimundas Matulevicius

  • Affiliations:
  • Norwegian University of Science and Technology, Norway;Norwegian University of Science and Technology, Norway;Institute of Computer Science, University of Tartu, Estonia

  • Venue:
  • International Journal of Secure Software Engineering
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Understanding the social engineering threat is important in requirements engineering for security-critical information systems. Mal-activity diagrams have been proposed as being better than misuse cases for this purpose, but without any empirical testing. The research question in this study is whether mal-activity diagrams would be more efficient than misuse cases for understanding social engineering attacks and finding prevention measures. After a conceptual comparison of the modelling techniques, a controlled experiment is presented, comparing the efficiency of using the two techniques together with textual descriptions of social engineering attacks. The results were fairly equal, the only significant difference being a slight advantage for mal-activity diagrams concerning perceived ease of use. The study gives new insights into the relative merits of the two techniques, and suggests that the advantage of mal-activity diagrams is smaller than previously assumed. However, more empirical investigations are needed to make detailed conclusions.